The IT Law Wiki
Advertisement

Citation[]

8706 T

Office of Technology Assessment, Defending Secrets, Sharing Data: New Locks and Keys for Electronic Information (OTA-CIT-310) (Oct. 1987) (full-text).

Overview[]

This report examined the vulnerability of communications and computer systems, and the trends in technology for safeguarding information in these systems. It reviewed the primary activities and motivations of stakeholders such as banks, government agencies, vendors, and standards developers to generate and use safeguards. It focuses on issues stemming from possible conflicts among federal policy goals and addresses important trends taking place in the private sector.

OTA prepared the report at the request of the House Committee on Government Operations and the Subcommittee on Civil and Constitutional Rights of the House Committee on the Judiciary. It was the second component of OTA's assessment of new communications technologies. The first component,[1] was published in September 1987.

In preparing this report, the OTA drew upon studies conducted by OTA project staff, contractor reports and consultants, a technical workshop, interviews with federal and private sector representatives, and those involved in research, manufacturing, financial services, consulting, and technical standards development.

References[]

Advertisement